156
results found in
14 ms
Page 1
of 16
Information Technology Cost Estimation Agencies Need to Address Significant Weakness in Policies and Practices
and agencies have appropriately implement costestimating policies an procedures(four caracteristics of a reliable cost estimation: comprehensive, well-documented, accurate, credible). ... To estimate reliable cost for the sucess of an IT program by providing the basis for the informed decision making and realistic budget information. To assess the extent to which selected departments ... IT cost estimation ... Check out what may go wrong with the information technology cost estimation. Results of the US GAO audit can help to identify high risk areas: comprehensiveness of estimations, their documentation ... , lack of adequacy and inadequate implementation.
Full description
and agencies have appropriately implement costestimating policies an procedures(four caracteristics of a reliable cost estimation: comprehensive, well-documented, accurate, credible). ... To estimate reliable cost for the sucess of an IT program by providing the basis for the informed decision making and realistic budget information. To assess the extent to which selected departments ... IT cost estimation ... Check out what may go wrong with the information technology cost estimation. Results of the US GAO audit can help to identify high risk areas: comprehensiveness of estimations, their documentation ... , lack of adequacy and inadequate implementation.
Full description
General Accountability Office
, issued in 2012
Risk cases: 4
Staff scheduling in government institutions
Scheduling irregular hours work Danish Rigsrevisionen shows in their study problems with staff scheduling in government institutions where employees are required to work irregular hours. Optimized staff scheduling contributed to reducing payroll costs. On the other hand, problems with rearrangement of work, recording working hours, optimisation of staffing levels and analysis of overtime triggers - add up to high costs of workforce. IT is not always used as ally either.
Full description
Scheduling irregular hours work Danish Rigsrevisionen shows in their study problems with staff scheduling in government institutions where employees are required to work irregular hours. Optimized staff scheduling contributed to reducing payroll costs. On the other hand, problems with rearrangement of work, recording working hours, optimisation of staffing levels and analysis of overtime triggers - add up to high costs of workforce. IT is not always used as ally either.
Full description
National Audit Office of Denmark
, issued in 2015
Risk cases: 5
The Art of Governing – the Government’s management of cultural sector institutions
The Art of Influencing cultural institutions Cultural sector is characterised by a large number of small government agencies, companies, foundations and a large diversity of operational forms. Governments may then have problems with the risk of conflicting goals.
Full description
The Art of Influencing cultural institutions Cultural sector is characterised by a large number of small government agencies, companies, foundations and a large diversity of operational forms. Governments may then have problems with the risk of conflicting goals.
Full description
Swedish National Audit Office
, issued in 2019
Risk cases: 5
Telecommunication solutions in the Institutions of Bosnia and Herzegovina
Strategies need systemic analysis Bosnia and Herzegovina state auditors analysed a set of strategies related to telecom solutions across the BiH administration. They found that lack of a systemic approach and of analytical support reduced abilities of the organistations to make full use of the up-to-date technologies.
Full description
Strategies need systemic analysis Bosnia and Herzegovina state auditors analysed a set of strategies related to telecom solutions across the BiH administration. They found that lack of a systemic approach and of analytical support reduced abilities of the organistations to make full use of the up-to-date technologies.
Full description
Audit Office of the Institutions of Bosnia and Herzegovina
, issued in 2014
Risk cases: 3
Higher education institutions' provision of premises- room for improvement
How to pay for higher education institutions' premises Higher education institutions' rental costs constitute a significant part of central government rental expenses. Swedish NAO analysed results of reform, which aimed at more effective use of resources at central government agencies and more effective management of real property and assets for the State as a whole. Apart from the positive results as a whole, substantial room for improvement still exists: especially in identifying targets of costs, looking for incentives and in mitigating commercial approach to education institutions.
Full description
How to pay for higher education institutions' premises Higher education institutions' rental costs constitute a significant part of central government rental expenses. Swedish NAO analysed results of reform, which aimed at more effective use of resources at central government agencies and more effective management of real property and assets for the State as a whole. Apart from the positive results as a whole, substantial room for improvement still exists: especially in identifying targets of costs, looking for incentives and in mitigating commercial approach to education institutions.
Full description
Swedish National Audit Office
, issued in 2018
Risk cases: 2
Report to the Public AccountsCommittee on mitigation of cyber attacks
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark
, issued in 2013
Risk cases: 3
Managing the risk of legacy ICT to public service delivery
The cross-government report describes the case studies from four public services (state pension, Value Added Tax collection, prescription payment and consumer credit licensing services) selected ... to illustrate the range of approaches that small and large government bodies are taking to address the issues arising from legacy ICT (defined as "systems and applications that have been operationally embedded ... within a business function but superseded by newer and more effective technologies or changed business needs"). ... Possible approaches to the problem of 'legacy ICT' ... UK’s government experience in managing the risks connected to legacy ICT provides valuable insight for others facing the same problem and are considering transforming their services.
Full description
The cross-government report describes the case studies from four public services (state pension, Value Added Tax collection, prescription payment and consumer credit licensing services) selected ... to illustrate the range of approaches that small and large government bodies are taking to address the issues arising from legacy ICT (defined as "systems and applications that have been operationally embedded ... within a business function but superseded by newer and more effective technologies or changed business needs"). ... Possible approaches to the problem of 'legacy ICT' ... UK’s government experience in managing the risks connected to legacy ICT provides valuable insight for others facing the same problem and are considering transforming their services.
Full description
National Audit Office
, issued in 2013
Risk cases: 3
Software management assessment in local governments and local government educational institutions
and local government educational institutions. ... Objective of the audit was to verify compliance of software recording and management with regulatory enactments, as well as to assess the effectiveness of software management in local governments ... ... Software management assessment in local governments and local government educational institutions ... Manage your software! Local governments and local government education institution neglect basic safety procedures, use outdated or illegal kinds of software, use two and more different software ... for the same function.
Full description
and local government educational institutions. ... Objective of the audit was to verify compliance of software recording and management with regulatory enactments, as well as to assess the effectiveness of software management in local governments ... ... Software management assessment in local governments and local government educational institutions ... Manage your software! Local governments and local government education institution neglect basic safety procedures, use outdated or illegal kinds of software, use two and more different software ... for the same function.
Full description
State Audit Office of the Republic of Latvia
, issued in 2013
Risk cases: 4
Audit on the current management and supervision of information protection and cyber security in the financial sector
- Based on a sample of 10 public institutions and 9 financial institutions. ... - Evaluation of management and supervision of information protection and cyber security in the financial sector - Evaluation of current state of security management system in the financial sector ... Information Protection and cyber security in the financial sector ... SAI Korea reviewed 10 public and nine financial institutions. Their analysis shows how the lack of evaluation at management level can result in decrease of stakeholders' confidence or even ... in economic damage.
Full description
- Based on a sample of 10 public institutions and 9 financial institutions. ... - Evaluation of management and supervision of information protection and cyber security in the financial sector - Evaluation of current state of security management system in the financial sector ... Information Protection and cyber security in the financial sector ... SAI Korea reviewed 10 public and nine financial institutions. Their analysis shows how the lack of evaluation at management level can result in decrease of stakeholders' confidence or even ... in economic damage.
Full description
Board of Audit and Inspection of Korea
, issued in 2011
Risk cases: 2
Quality of public services in information society in 2010
The National Audit Office found that irrespective of a few positive changes, the quality of provision of public services in information society has not improved significantly in comparison to 2007 ... . Information about the services is still difficult to find on websites and people who use public services must still submit unjustified documents, proof of facts or go to administrative agencies in person ... Report: The National Audit Office audited the quality of public services, analysing the compatibility of provision of these services with the principles of good administration. The principles of good ... ... The quality of public services has been improved but still isn’t good enough ... Irrespective of a few positive changes, the quality of provision of public services in information society has not improved significantly in comparison to 2007. Information about the services ... is still difficult to find on websites and people who use public services must still submit unjustified documents, proof of facts or go to administrative agencies in person.
Full description
The National Audit Office found that irrespective of a few positive changes, the quality of provision of public services in information society has not improved significantly in comparison to 2007 ... . Information about the services is still difficult to find on websites and people who use public services must still submit unjustified documents, proof of facts or go to administrative agencies in person ... Report: The National Audit Office audited the quality of public services, analysing the compatibility of provision of these services with the principles of good administration. The principles of good ... ... The quality of public services has been improved but still isn’t good enough ... Irrespective of a few positive changes, the quality of provision of public services in information society has not improved significantly in comparison to 2007. Information about the services ... is still difficult to find on websites and people who use public services must still submit unjustified documents, proof of facts or go to administrative agencies in person.
Full description
National Audit Office of Estonia
, issued in 2010
Risk cases: 2